CTF collection Vol.1

Task 2: What does the base said?

Can you decode the following? VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==

Feed me the flag!

  • We can decode the flag using the base64 utility.

Answer

Task 3: Meta meta

I'm hungry, I need the flag.

  • The name of the task hints us that the flag might be in the image metadata.

  • We can extract this metadata using exiftool.

Answer

Task 4: Mon, are we going to be okay?

It is sad. Feed me the flag.

  • Sometimes other data or files can be hidden inside of JPG files.

  • We can use steghide to extract these hidden files.

  • Let's read the Final_message.txt file.

Answer

Task 5: Erm......Magick

Huh, where is the flag?

Did you find the flag?

  • If we just select the task string, we will see the flag.

Answer

Task 6: QRrrrr

More flag please!

  • The image we have is a QR code.

  • In order to extract the flag, we can use the ZXing Decoder.

Answer

Task 7: Reverse it or read it?

Found the flag?

  • For this challenge we are given an executable file.

  • We can check the strings inside the file using the strings command.

Answer

Task 8 Another decoding stuff

Can you decode it? 3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L

Oh, Oh, Did you get it?

  • We can use the Magic function from CyberChef to decode the flag.

Answer

Task 9 Left or right

Left, right, left, right... Rot 13 is too mainstream. Solve this MAF{atbe_max_vtxltk}

  • Let's use the Rot13 function with the amount set to 7.

Answer

Task 10: Make a comment

I'm hungry now... I need the flag

  • Let's inspect the page.

Answer

Task 11: Can you fix it?

I accidentally messed up with this PNG file. Can you help me fix it? Thanks, ^^

  • Let's check the hash dump of the PNG file.

  • So the first 4 characters are wrong. In a PNG file the first 4 characters should be 89 50 4E 47 as shown in this image:

  • Let's use hexedit to fix the bytes.

  • We should now be able to view the image.

Task 12 Read it

Did you found the hidden flag?

  • For this question, we have to perform some Google dorking.

  • Enter the following text in the search bar and click on the first link:

Answer

Task 13: Spin my head

What is this?++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>++++++++++++++.------------.+++++.>+++++++++++++++++++++++.<<++++++++++++++++++.>>-------------------.---------.++++++++++++++.++++++++++++.<++++++++++++++++++.+++++++++.<+++.+.>----.>++++.

Can you decode it?

  • The text is encrypted using Brainfuck.

  • We can decode it using an online decoder.

Answer

Task 14: An exclusive!

Exclusive strings for everyone! S1: 44585d6b2368737c65252166234f20626d S2: 1010101010101010101010101010101010

Did you crack it? Feed me now!

  • Since there are two strings, the possible decryption method is XOR.

  • Let's use an online decoder.

Answer

Task 15 Binary walk

Flag! Flag! Flag!

  • We have to extract the embedded files from the JPG file using binwalk.

  • We can now read the flag from the hello.txt file.

Answer

Task 16 Darkness

What does the flag said?

  • We have to first download stegsolve for this task using the following command:

  • We have to now move the dark.png image to the bin folder that we crated.

  • We are now ready to use stegsolve.

  • After opening the image using stegsolve, we have to go to Blue plane 1 to be able to see the flag.

Answer

Task 17: A sounding QR

How good is your listening skill? P/S: The flag formatted as THM{Listened Flag}, the flag should be in All CAPS

What does the bot said?

  • Let's decode the QRCTF.png file using Zxing.

  • We are given a Soundcloud link as the result.

  • Let's visit the link.

  • The audio tells us that the flag is soundingqr.

Answer

Task 18: Dig up the past

Sometimes we need a 'machine' to dig the past Targetted website: https://www.embeddedhacker.com/ Targetted time: 2 January 2020

  • For this one we have to use the Wayback Machine.

  • Let's look at the snapshot created on January 2, 2020.

Answer

Task 19: Uncrackable!

Can you solve the following? By the way, I lost the key. Sorry >.< MYKAHODTQ{RVG_YVGGK_FAL_WXF} Flag format: TRYHACKME{FLAG IN ALL CAP}

The deciphered text

  • In this task, we have to use the # Vigenère cipher.

  • The key is THM.

Answer

Task 20: Small bases

Decode the following text. 581695969015253365094191591547859387620042736036246486373595515576333693

What is the flag?

  • We simply have to convert it from Decimal to Hexadecimal to ASCIII.

Hexadecimal

Answer

Task 21: Read the packet

Did you captured my neighbor's flag?

  • We have to open the PCAP using Wireshark and set the following filter:

  • That filters for the HTTP packets.

  • We can find the flag in packet 1827.

Answer

Last updated

Was this helpful?